-
Essay / Assessing the Importance of a Disaster Recovery Manager
Disaster Recovery Plan Decision Manager It is important to establish a disaster recovery plan decision manager before starting the disaster recovery plan. This person will be in charge of the disaster recovery operation. For SIHE, the person in charge will be the institute's security manager (Mr Hue Williams contact: 01792 455695). He will ensure that all steps in the disaster plan are carried out if necessary. Another manager will also be indicated. This person will be the Security Manager located on the Townhill campus. If, for any reason, the primary security officer is not available, this person will replace him or her. (Contact Mr Greg Adams: 01792 477895 ext 665) Staff Assignments and Responsibilities Backup - Staff are expected to back up their work regularly and save it to disks as well as the computer. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essay Comply with security policy – All staff must be provided with a security policy and must comply with the company's information security policy and no other available software. that are intended for them must be used on the network. New location - If necessary, all staff must be prepared to work in another location in the event of a disaster that prevents them from working in their current location. Training - Staff must complete training to be prepared. and be able to cope.Network Manager - This person will ensure that the universities network is operational in the event of a problem. You should contact him when this happens. He must know all the procedures and backup plans when a problem arises and know where all additional equipment is kept in case of a problem. A second or backup network manager should also be appointed in case the network manager is unavailable. and equipment01792 665748 Robert ThomasSecurity OfficerBackup Access01792 558657 ext. 445 In the event of a major disaster, all those named above should be contacted to ensure full disaster recovery.Threats The threats that the Swansea Institute may encounter are disasters deliberate physical, accidental and natural threats. Deliberate threats: Hardware sabotage Hardware theft Software piracy Copied or stolen data Fire viruses Accidental threats Data loss Accidental deletion of data Circuit failure Network failure Computer failure Natural disasters Fires Floods Weather damage, i.e. storms Power loss Priority list The Swansea Institute has four departments located across the network. are: - Student zone Academic zone Financial zone Registry zone Network zone This includes 1 login server 1 web server 1 mail server 1 DNS server 1 DHCP server 1 library server Now I will put in order what has the most priority the network, i.e. what needs to be repaired first. I have a color code in order of importance: Red = The danger must be corrected immediately Orange = The risk must be corrected as soon as possible Blue = No immediate risk but must be corrected when possible [1] Finance Zone (code red) - This problem should be resolved immediately and the network server manager should be contacted when errors occur and the full backup procedure should be used. Networks area (orange code) - This should be fixed as soon as possible. Registry area (code orange) – This should be fixed as soon as possible.Student Area (Code Blue) – Although this is thorough, this has been coded blue as there is no immediate risk. This should also be fixed as soon as possible as it contains student work, which they might need to access quickly. Academic Area (Code Blue) - Again, this should also be fixed as soon as possible, even though it has only been assigned a Code Blue. May contain teacher notes for classes as well as exam papers. The network (code red) - If the network fails, this should be repaired immediately and the network manager should also be contacted as soon as the problem arises. If not available, the second network manager must be appointed. backup should be kept Data and Material Multiple backup copies of data should be kept in multiple locations: - 1 copy of data to be kept in the Mount Pleasant building 1 copy of the data should be stored on the Townhill campus 2 copies of the data should be kept outside the building in Mount Pleasant. Multiple people should know the location of this data so that it can be easily retrieved when needed. The same goes for hardware and software. All backups are kept on 3 different types of backup media, so one of them gets corrupted and another version can be used. Networks, circuits, backbone, cable Additional equipment such as circuits, repeaters, backbone, extra cables and bridges must be kept inside the Mount Pleasant building as well as outside the building and on the grounds of the Townhill campus . The network manager should know the exact location where these files are kept and should be stored in a location that is easy to retrieve. Procedures to Ensure Adequate Testing of the Recovery Plan Testing of backup procedures should also be performed regularly. This can be every time the institute conducts a fire drill. During the test, you must perform any procedures that might arise in the event of a real disaster, such as verifying that the electrical generator is operating efficiently in the event of a power outage. All software and data backups should also be verified so that in the event of data loss, it is easy to recover. Always check that you can play the media you have saved. Additionally, if data is encrypted, make sure multiple people know how to decrypt it. Create multiple backups to provide redundancy in your backup system. Additionally, if for any reason one of the backup media is damaged or lost, other backup media are still available. Additional backup must also be maintained off-site at the Mount Agréable building, such as on the Townhill campus. Special care should be taken to ensure that backup media is not stored in a location where it is subject to damage such as heat, water and wind. It's also important not to forget to check automatic backups. You should check that they are working properly by carrying out routine checks regularly. Once a tested backup has been made, a report should be made on how the backup was recovered, if there were any issues, and ways to improve it. the backup procedure.Backup Strategy The file server must contain two disk drives, mirrored disks containing identical data. All data is recorded on both disks simultaneously, so that if one disk fails, the other disk drive contains all the data. A daily backupAll data is done on tape and stored in the vault. Each week, a tape containing a copy of all data is stored off-site. The system administrator should review the system logs daily to ensure that the backup process completed successfully. Periodically, the recovery process is tested to ensure that the recovery procedures are operational and valid. A copy of all original system programs is stored on-site in the computer library and another copy is stored off-site. A backup copy of system programs is made monthly to ensure that all relevant software patches will be included in the recovery processes. This monthly backup copy is also tested periodically to ensure the validity of the recovery process. Daily backups should be kept for one week. Weekly backups should be kept for one month. Keep all monthly backups for one year. All backup media should be carefully labeled. understands what was backed up and when. If the data saved is only changes, incremental backups should be made, which will save storage space, but this should only be done after a full backup has been taken. created.Backup Sites A backup site will be assigned if for any reason data recovery cannot be performed in Mount Pleasant, the backup site will be at the Townhill campus and another backup site should also be available outside the main Swansea Institute building. These backup sites should contain all the necessary facilities to perform a backup, such as the necessary computers, power and cabling, etc. If possible, an agreement should be made with an alternative site in case a recovery plan cannot take place at either the Townhill campus or the Townhill campus. Mount Pleasant campus, in this case it should take place at Swansea University in Wales. Data and software storage Different types of media must be used to store data and software. Tape backup. Small amounts of data that do not need to be updated or changed can also be stored here, data that needs to be backed up regularly. It is also inexpensive. However, tape backups are time-consuming, so it's not a good idea to use them when a lot of data needs to be backed up quickly. Recordable CDs. This type of media is useful for keeping copies of software because they are capable of holding large amounts of data, as they can hold up to 640 and 800 megabytes (MB) of data. The software should not need to be backed up provided you have the original backup, unless the software has been modified or updated. Floppy disks. These can again be used when little data needs to be stored. A simple method of write-protecting disks can be used to ensure that data is not accidentally or intentionally overwritten. Automatic backups. Backup Exec is preferred because it can be made completely automatic and is one of the highest-rated products in the industry. You can purchase it on the website www.dabs.com. What to do in case of: Power outage In the event of a power outage, the backup generator must be turned on. It is located between servers 8654A and 64368B in room 312 (level 3). Another emergency generator is also located in the FADE building within the security office, i.e. the room.